UNDERCODE COMMUNITY
2.68K subscribers
1.23K photos
31 videos
2.65K files
80.1K links
πŸ¦‘ Undercode Cyber World!
@UndercodeCommunity


1️⃣ World first platform which Collect & Analyzes every New hacking method.
+ AI Pratice
@Undercode_Testing

2️⃣ Cyber & Tech NEWS:
@Undercode_News

3️⃣ CVE @Daily_CVE

✨ Web & Services:
β†’ Undercode.help
Download Telegram
Forwarded from UNDERCODER
πŸ¦‘DeepfakeOSβ„’, the first-of-its-kind Linux-based toolkit designed exclusively for ethical deepfake penetration testing and advancing cognitive security.

DeepfakeOSβ„’ is a cutting-edge Linux operating system preloaded with open-source tools for ethically creating synthetic media, including video, audio, and text. As synthetic media becomes more advanced, so do the threats it poses. DeepfakeOSβ„’ empowers security professionals and researchers to understand, test, and defend against these emerging threats by providing a comprehensive, preloaded toolkit for ethical purposes.


https://deepfakedashboard.com/deepfakeos

@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘New evasion technique that is bypassing almost all security solutions so far, taking advantage of the recovery functionality in applications. This is groundbreaking as most if not all endpoint solutions aren’t armed with any file recovery techniques and would fail to detect this attack vector.

>> Microsoft has structured word documents similar to archives, constructing any doc file with 3 sections; starting with local file headers, central file headers and end directory records. These 3 sections are linked backward starting from the end to the header.

>> Manipulating any of these sections makes it harder for any endpoint or email security solution to unpack and identify the issue, but recoverable by its intending application after its too late.

Ref: Chadi S.

@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from Exploiting Crew (Pr1vAt3)
This media is not supported in your browser
VIEW IN TELEGRAM
πŸ¦‘How run the Password Reset Flaw | Live PoC - New method

Ref: Rohith S.
@UndercodeCommunity
▁ β–‚ β–„ Uπ•Ÿπ”»β’Ίπ«Δ†π”¬π““β“” β–„ β–‚ ▁
Forwarded from UNDERCODE TESTING
Media is too big
VIEW IN TELEGRAM
πŸ¦‘ The Official NASA CSRF Vulnerability Video
Forwarded from Exploiting Crew (Pr1vAt3)